Hardware Security Module – Cryptographic Solution for Enterprise

Hardware Security Module (HSM) is an integral part of the security of enterprises and big businesses. Below 10 points give an insight of HSM, its usage, manufacturers of HSM, what are the features of HSM, the price of HSM, cloud-based HSM … Continue reading “Hardware Security Module – Cryptographic Solution for Enterprise”


How to Install/Update OpenSSL on Ubuntu Machine

OpenSSL is an open-source, full-featured cryptographic library. It contains a full implementation of SSL and TLS protocol which is responsible for transport layer security. It is developed mostly in C language and versions are available for the popular operating systems … Continue reading “How to Install/Update OpenSSL on Ubuntu Machine”

Top 15 Practical Examples of SED Linux Command

SED is a Linux command which is generally used to edit a file by replacing the string, delete strings and lines without even opening a file and without affecting the original content of file. It is also called Stream Editor. It … Continue reading “Top 15 Practical Examples of SED Linux Command”

Top 10 Interview Questions and Answers: Introduction to Embedded Systems (Basic)

Here we will discuss Top 10 Interview Questions and Answers on topic Introduction of Embedded Systems. This article is perfect for beginners who wants to increase understanding of embedded systems. I believe covering Questions and Answers are the best way … Continue reading “Top 10 Interview Questions and Answers: Introduction to Embedded Systems (Basic)”


Testssl.sh : Tool to check SSL/TLS related vulnerabilities

Testssl is an open source tool used to check the implementation of SSL/TLS on websites and gives a list of the cryptographic vulnerabilities or flaws by shooting simple commands. It is open source and very easy to use bash script which … Continue reading “Testssl.sh : Tool to check SSL/TLS related vulnerabilities”

Information Gathering Techniques for Penetration Testing

Information Gathering is the first and foundation step in the success of penetration testing.  The more useful information you have about a target, more you able to find vulnerabilities in the target and hence able to find more serious problems in … Continue reading “Information Gathering Techniques for Penetration Testing”

Short Tutorial: Tuples, Sets and Dictionaries in Python

Today, we will discuss the concept of different data types such as tuples, sets, and dictionaries in python. In the end of this article, we will cover some commonly asked questions on these concepts in Python. Tuples Tuples are similar to … Continue reading “Short Tutorial: Tuples, Sets and Dictionaries in Python”

1 2 3 11